SonicOS uses firewall access rules, among other features, to restrict or augment traffic ingressing and egressing your network. By default all trusted zones, such as the LAN, have default access rules allowing them to get to all Trusted and Public Zones. Conversely, Public Zones cannot get to Trusted Zones by default but can be allowed access via port forwarding. If you'd like more information on port forwarding please reference How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall.
The SonicWall is also able to restrict traffic from any zone to any zone by access rules and using groups. This implementation will redirect a user to authenticate against the SonicWall before they're allowed to pass traffic through it. Implementing this allows administrators to restrict certain users or groups as desired as well as also forcing them to authenticate for purposes of Content Filtering, Security Service, and so on.
TIP: There is a transparent process by which User Authentication can be done known as Single Sign-On (SSO). If you'd like more information on SSO please reference Configuring Single Sign-On.
NOTE: The configuration in this article is presented as required Users to authenticate before passing traffic from the LAN to the WAN. However these principles can be applied from any zone to any other zone, and across any services.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
NOTE: Users could be either created locally or authenticated via LDAP or RADIUS. For this example we'll use Local Users.
Login to the SonicWall Management GUI.
For the purpose of this article, you can create an outbound access rule which allows LAN devices to get to the WAN.
FIRST RULE (which enforces user authentication):
CAUTION: Without an access rule allowing DNS Traffic out, the authentication page will not show and the traffic will be blocked unless the users manually go to the authentication page and authenticate.
SECOND RULE (which bypasses user authentication for DNS Traffic):
NOTE: make sure the rule has a higher priority than the previous one you created!
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
NOTE: Users could be either created locally or authenticated via LDAP or RADIUS. For this example we'll use Local Users.
Login to the SonicWall Management GUI.
For the purpose of this article, you can create an outbound access rule which allows LAN devices to get to the WAN.
FIRST RULE (which enforces user authentication):
CAUTION: Without an access rule allowing DNS Traffic out this configuration will not work. The DNS access rule is only required when Users are utilizing DNS names.
SECOND RULE (which bypasses user authentication for DNS Traffic):
NOTE: make sure the rule has a higher priority than the previous one you created!